Presentation is loading. Please wait.

Presentation is loading. Please wait.

Hardware and Petri nets Partial order methods for analysis and verification of asynchronous circuits.

Similar presentations


Presentation on theme: "Hardware and Petri nets Partial order methods for analysis and verification of asynchronous circuits."— Presentation transcript:

1 Hardware and Petri nets Partial order methods for analysis and verification of asynchronous circuits

2 Outline Representing Petri net semantics with occurrence nets (unfoldings) Unfolding (finite) prefix construction Analysis of asynchronous circuits Problems with efficient unfolding

3 Approaches to PN analysis Reachable state space: –Direct or symbolic representation –Full or reduced state space (e.g. stubborn set method) in both cases knowledge of Petri net structural relations (e.g. conflicts) helps efficiency Unfolding the Petri net graph into an acyclic branching graph (occurrence net), with partial ordering between events and conditions and: –Considering a finite prefix of the unfolding which covers all reachable states and contains enough information for properties to be verified

4 Occurrence nets p1 p5 p3 t2 t5 t6 t1 t4 t3 p7 p6 t7 p2 p4 Petri net Occurrence net Min-place

5 Occurrence nets The occurrence net of a PN N is a labelled (with names of the places and transitions of N) net (possibly infinite!) which is: –Acyclic –Contains no backward conflicts (1) –No transition is in self-conflict (2) –No twin transitions (3) –Finitely preceded (4) p6 t5 t3 (1) t1 t p1 t2 (2) t7 p6 p7 t7 (3) t p1 p2 infinite set (4) NO!

6 Relations in occurrence nets p1 p5 p3 t2 t5 t6 t1 t4 t3 p2 p4 p6 t7 p7 t7 p6 p5 p3 t5 t6 t4 t3 p2 p4 p7 p6 t2t1 p1 p6 p5 p3 t2 t5 t6 t1 t4 t3 p2 p4 p7 p1 conflict precedence concurrency

7 Unfolding of a PN The unfolding of Petri net N is a maximal labelled occurrence net (up to isomorphism) that preserves: –one-to-one correspondence (bijection) between the predecessors and successors of transitions with those in the original net –bijection between min places and the initial marking elements (which is multi-set) p7 p6 t7 p7’ p6’ t7’ net N unfolding N’ net N p’ p’’ p unfolding N’

8 Unfolding construction p1 p3 t5 t6 t1 t4 t3 p7 p6 t7 p2 p5 t2 p4 p1 t1 p3 p2 p5 t2 p4 t3 p6 t4 p7 t5 p6 t6 p7 t7 p1 t7 p1 and so on …

9 Unfolding construction p1 p5 p3 t2 t5 t6 t1 t4 t3 p7 p6 t7 p2 p4 Petri net Unfolding

10 Petri net and its unfolding p1 p3 t5 t6 t1 t4 t3 p7 p6 t7 p2 p5 t2 p4 p1 t1 p3 p2 p5 t2 p4 t3 p6 t4 p7 t5 p6 t6 p7 t7 p1 t7 p1 markingcut

11 Petri net and its unfolding p1 p3 t5 t6 t1 t4 t3 p7 p6 t7 p2 p5 t2 p4 p1 t1 p3 p2 p5 t2 p4 t3 p6 t4 p7 t5 p6 t6 p7 t7 p1 t7 p1 markingcut

12 Petri net and its unfolding p1 p3 t5 t6 t1 t4 t3 p7 p6 t7 p2 p5 t2 p4 p1 t1 p3 p2 p5 t2 p4 t3 p6 t4 p7 t5 p6 t6 p7 t7 p1 t7 p1 markingcut

13 Petri net and its unfolding p1 p3 t5 t6 t1 t4 t3 p7 p6 t7 p2 p5 t2 p4 p1 t1 p3 p2 p5 t2 p4 t3 p6 t4 p7 t5 p6 t6 p7 t7 p1 t7 p1 PN transition and its instance in unfolding

14 Petri net and its unfolding p1 p3 t5 t6 t1 t4 t3 p7 p6 t7 p2 p5 t2 p4 p1 t1 p3 p2 p5 t2 p4 t3 p6 t4 p7 t5 p6 t6 p7 t7 p1 t7 p1 Prehistory (local configuration) of the transition instance Final cut of prehistory and its marking (final state)

15 Petri net and its unfolding p1 p3 t5 t6 t1 t4 t3 p7 p6 t7 p2 p5 t2 p4 p1 t1 p3 p2 p5 t2 p4 t3 p6 t4 p7 t5 p6 t6 p7 t7 p1 t7 p1 Prehistory (local configuration of the transition instance) Final cut of prehistory and its marking (final state)

16 Truncation of unfolding At some point of unfolding the process begins to repeat parts of the net that have already been instantiated In many cases this also repeats the markings in the form of cuts The process can be stopped in every such situation Transitions which generate repeated cuts are called cut-off points or simply cut-offs The unfolding truncated by cut-off is called prefix

17 Cutoff transitions p1 p3 t5 t6 t1 t4 t3 p7 p6 t7 p2 p5 t2 p4 p1 t1 p3 p2 p5 t2 p4 t3 p6 t4 p7 t5 p6 t6 p7 t7 p1 t7 p1 Cut-offs

18 Cutoff transitions p1 p3 t5 t6 t1 t4 t3 p7 p6 t7 p2 p5 t2 p4 p1 t1 p3 p2 p5 t2 p4 t3 p6 t4 p7 t5 p6 t6 p7 t7 p1 t7 p1 Cut-offs pre-history of t7’

19 Prefix Construction Algorithm Proc Build prefix (N = ) Initialise N’ with instances of places in M0 Initialise Queue with instances of t enabled at M0 while Queue is not empty do Pull t’ from Queue if t’ is not cutoff then do Add t’ and succ(t’) to N’ for each t in T do Find unused set of mutually concurrent instances of pred(t) if such set exists then do Add t’ to Queue in order of its prehistory size end do return N’ end proc

20 Cut-off definition A newly built transition instance t1’ in the unfolding is a cut-off point if there exists another instance t2’ (of possibly another transition) whose: –Final cut maps to the same marking is the final cut of t1’, and –The size of prehistory (local configuration) of t2’ is strictly greater than that of t1’ [McMillan, 1992] Initial marking and its min-cut are associated with an imaginary “bottom” instance (so we can cut-off on t7 in our example)

21 Finite prefix p1 t1 p3 p2 p5 t2 p4 t3 p6 t4 p7 t5 p6 t6 p7 t7 p1 p3 t5 t6 t1 t4 t3 p7 p6 t7 p2 p5 t2 p4 For a bounded PN the finite prefix of its unfolding contains all reachable markings [K. McMillan]

22 Complexity issues The prefix covers all reachable markings of the original net but the process of prefix construction does not visit all these markings Only those markings (sometimes called Basic Markings) are visited that are associated with the final cuts of the local configurations of the transition instances These markings are analogous to primes in an algebraic lattice The (time) complexity of the algorithm is therefore proportional to the size of the unfolding prefix For highly concurrent nets this gives a significant gain in efficiency compared to methods based on the reachability graph

23 Size of Prefix a1 a2 an … b The size of the prefix for this net is O(n) – same as that of the original net while the size of the reachability graph is O(2 n ) This is however not always true and the size depends on: the structure and class of the net, and initial marking

24 Size of Prefix a1 a2 b2 b1 c2 c1 a1 a2 b1 b2 c1 c2 c1 c2 b2 b1 c2 c1 c2 c1 cut-off points p1 p2 p3 p4 p1 p2 p3 p4

25 Size of Prefix a1 a2 b2 b1 c2 c1 a1 a2 b1 b2 c1 c2 c1 c2 b2 b1 c2 c1 c2 c1 p1 p2 p3 p4 p1 p2 p3 p4 Redundant part

26 Size of Prefix a b c 1 3 2 4 a b c 1 3 2 4 2 a b c 3 4 2 1 1 2 Cut-offs However this part is redundant Non-1-safe net

27 Cut-off Criteria McMillan’s cutoff criterion, based on the size of pre-history, can be too strong A weaker criterion, based only on the matching of the final cuts, was proposed by Esparza, Vogler, and Römer –It uses a total (lexicographical) order on the transition set (when putting them into Queue) –It can be only applied to 1-safe nets because for non-1- safe nets such a total order cannot be established (main reason auto-concurrency of instances of the same transition!) Unfolding k-safe nets can produce a lot of redundancy

28 Property analysis A model-checker to verify a CTL formula (defined on place literals) has been built (Esparza) within the PEP tool (Hildesheim/Oldenburg) Various standard properties, such as k-boundedness, 1- safeness, persistency, liveness, deadlock freedom have special algorithms, e.g.: –Check for 1-safeness is a special case of auto-concurrency (whether a pair of place instances exist that are mutually concurrent – can be done in polynomial time) –Similar is a check for persistency of some transition (analysis of whether it is in immediate conflict with another transition) –Check for deadlock is exponential (McMillan) – involves enumeration of configurations (non-basic markings), however efficient linear-algebraic techniques have recently been found by Khomenko and Koutny (CONCUR’2000)

29 STG Unfolding Unfolding an interpreted Petri net, such as a Signal Transition Graph, requires keeping track of the interpretation – each transition is a change of state of a signal, hence each marking is associated with a binary state The prefix of an STG must not only “cover” the STG in the Petri net (reachable markings) sense but must also be complete for analysing the implementability of the STG, namely: consistency, output-persistency and Complete State Coding

30 STG Unfolding a+ b+ c+ d+ d- p1 p2 p3 p4 p5 p1 p2 p3 p4 p5 STG Uninterpreted PN Reachability Graph Binary-coded STG Reach. Graph (State Graph) p1(0000) abcd p2(1000) a+ p3(0100) b+ c+ p4(1010) p4(0110) p5(1011) d+ p5(0111) a+ b+ c+ p1 p2 p3 d+ d- p4 p5 STG unfold. prefix d+ d- p4 p5

31 STG Unfolding a+ b+ c+ d+ d- p1 p2 p3 p4 p5 p1 p2 p3 p4 p5 STG Uninterpreted PN Reachability Graph Binary-coded STG Reach. Graph (State Graph) p1(0000) abcd p2(1000) a+ p3(0100) b+ c+ p4(1010) p4(0110) p5(1011) d+ p5(0111) a+ b+ c+ p1 p2 p3 d+ d- p4 p5 STG unfold. prefix Not like that!

32 Consistency and Signal Deadlock p1 a+ a- b- b+ b- p3 p2 p4 p5 p6 p2p4 p1p4 p2p5 p1p5 p3p4 p3p5 a- a+ b+ b- p1p6 p2p6 p3p6 a+ b+ b- STG PN Reach. Graph STG State Graph p1p6(00) p2p6(10) p3p6(01) a+ b+ b- ab a- p1p4(00) a+ p2p4(10) b+ p2p5(11) b- p3p4(01) b+ p1p5(01) b- Signal deadlock wrt b+ (coding consistency violation)

33 Signal Deadlock and Autoconcurrency p1 a+ a- b- b+ b- p3 p2 p4 p5 p6 STG STG State Graph p1p6(00) p2p6(10) p3p6(01) a+ b+ b- ab a- p1p4(00) a+ p2p4(10) b+ p2p5(11) b- p3p4(01) b+ p1p5(01) b- Signal deadlock wrt b+ (coding consistency violation) STG Prefix p1 a+ a- b+ b- b+ p3 p2 p4 p5 p6 a+ p1 b- p2 b- Autoconcurrency wrt b+

34 Verifying STG implementability Consistency – by detecting signal deadlock via autoconcurrency between transitions labelled with the same signal (a* || a*, where a* is a+ or a-) Output persistency – by detecting conflict relation between output signal transition a* and another signal transition b* Complete State Coding is less trivial – requires special theory of binary covers on unfolding segments (Kondratyev et.al.)

35 Experimental results (from Semenov) Example with inconsistent STG: PUNT quickly detects a signal deadlock “on the fly” while Versify builds the state space and then detects inconsistent state coding

36 Analysis of Circuit Petri Nets Event-driven elements Petri net equivalents C Muller C- element Toggle

37 Analysis of Circuit Petri Nets Petri net models built for event-based and level-based elements, together with the models of the environment can be analysed using the STG unfolding prefix The possibility of hazards is verified by checking either 1-safeness (for event-based) or persistency (for level-based) violations

38 Experimental results (from Kondratyev)

39 Circuit Petri Nets Level-driven elements Petri net equivalents NAND gate x(=1) y(=1) z(=0) NOT gate x(=1) y(=0) x=0 x=1 y=0 y=1 b x=0 x=1 z=0 z=1 y=0 y=1 Self-loops in ordinary P/T nets

40 Circuit Petri nets The meaning of these numerous self-loop arcs is however different from self-loops (which take a token and put it back) These should be test or read arcs (without consuming a token) From the viewpoint of analysis we can disregard this semantical discrepancy (it does not affect reachability graph properties!) and use ordinary PN unfolding prefix for analysis, BUT …

41 Unfolding Nets with Read Arcs PN with self- loops Unfolding with self-loops Combinatorial explosion due to splitting the self-loops Unfolding with read arcs

42 Unfolding k-safe nets How to cope with k-safe (k>1) nets and their redundancy Such nets are extremely useful in modelling various hardware components with: –Buffers of finite capacity –Counters of finite modulo count McMillan’s cutoff condition is too strong (already much redundancy) EVR’s condition is too weak – cannot be applied to k-safe nets Proposed solution: introduce total order on tokens, e.g. by applying FIFO discipline of their arrival- departure (work with F.Alamsyah et al.)

43 Unfolding k-safe Nets Example: producer-consumer

44 Unfolding k-safe Nets Consider the case: n=1 consumer k=2-place buffer Three techniques have been studied (by F. Alamsyah): (1)Direct prefix using McMillan’s cutoff criterion (2)Unfolding the explicitly refined (with FIFO buffers) 1- safe net (using EVR cutoff criterion) (3)Unfolding the original, unrefined net with FIFO semantics

45 Unfolding k-safe Nets Approach (2) for refining FIFO places into 1-safe subnets

46 Unfolding k-safe Nets (1) Direct unfolding prefix (using McMillan’s cutoff)

47 Unfolding k-safe Nets (2) Unfolding the explicitly refined (with FIFO buffers) 1-safe net (using EVR’s cutoff)

48 Unfolding k-safe Nets (2) Unfolding the original, unrefined net with FIFO semantics

49 Unfolding k-safe Nets k-bounded net with Mcmillan's unfolding safe nets using ERV's algorithm sizeOriginalUnfolding (t/p) time( s) OriginalUnfolding (t/p) time(s ) 26/8184/3170.058/1429/680.03 36/81098/18960.8410/1846/1050.10 46/86944/1191121.4612/2267/1500.28 56/8--14/2692/2030.74 66/8--16/30121/2641.84 76/8--18/34154/3334.25 86/8--20/38191/410 Buffer 8.74

50 Unfolding k-safe Nets Buffersafe nets using ERV's algorithmFIFO-unfolding with McMillan's sizeOriginalUnfolding (t/p) time( s) OriginalUnfolding (t/p) time(s ) 28/1429/680.036/841/690.010 310/1846/1050.106/841/680.010 412/2267/1500.286/851/840.020 514/2692/2030.746/861/1000.020 616/30121/2641.846/871/1160.040 718/34154/3334.256/881/1320.050 820/38191/4108.746/891/1480.060

51 Conclusion Unfolding can be very efficient where a lot of concurrency and little choice involved However unfolding may be very inefficient - can be “excessively resolving” (e.g. individualise tokens in k-safe nets or split self-loops) and thus spawn too many branches in history Other forms of unfolding can be studied (e.g. non- aggressive unfolding of places – building DAGs instead of branching processes) Unfoldings have also been used to analyse nets with time annotation and for synthesis of circuits but these are hot research topics – Haway the lads!


Download ppt "Hardware and Petri nets Partial order methods for analysis and verification of asynchronous circuits."

Similar presentations


Ads by Google